TA080_Application_Security_Architecture
TA080_Application_Security_Architecture
Author: <Author>
Creation Date: June 11, 1999
Last Updated: June 14, 1999
Document Ref: <Document Reference Number>
Version: DRAFT 1A
Approvals:
<Approver 1>
<Approver 2>
TA.080 Application Security Architecture Doc Ref: <Document Reference Number>
June 14, 1999
Document Control
Change Record
3
Reviewers
Name Position
Distribution
Note To Holders:
If you receive an electronic copy of this document and print it out, please
write your name on the equivalent of the cover page, for document
control purposes.
If you receive a hard copy of this document, please write your name on
the front cover, for document control purposes.
Contents
Document Control............................................................................................
Introduction......................................................................................................
Purpose......................................................................................................
Basic Business Needs................................................................................
Application and Database Security Architecture............................................
Background................................................................................................
Application Security Mapping..........................................................................
Introduction
Purpose
However, any individual in the <Project Name> project team should have
access to the deliverable for reference purposes.
Background
The next easiest method is to prevent users from having access to forms,
batch programs or reports where they can query and manipulate the
secure business objects. This technique provides effective data level
security by removing access to a complete function in the applications.
This is fully supported in Oracle Applications and is achieved by careful
definition of menus and responsibilities.
The method that will be used to implement the security features are
briefly documented in the last column of the table.
General Ledger Corporate GL Corporate Secure by Set Only Corporate users Standard
on-line/batch of Books should have Oracle
transactions and read/transaction access
reports
Revenue Entity GL Revenue entity on- Secure by Set Restrict read/transaction Standard
line/batch of Books access by other entities. Oracle
transactions and Corporate finance users
reports can read/transact any
data.
Payables Vouchers Read/transact Access to all Only match to POs for Access
access to Revenue Revenue Entity. through a
Entity Vouchers Corporate finance users secured
can read/transact any Oracle ID
data. using
views/synony
ms
On-line Invoice Access to form Only release holds for Access
Approvals Revenue Entity. through a
Corporate finance users secured
can read/transact any Oracle ID
data. using
views/synony
ms
Vouchers, Batch Posting of Access to Restrict access to Access
Credit/Debit journal entries Form vouchers, credit/debit through a
Memos memos by Revenue secured
Entity. Corporate Oracle ID
finance users can using
read/transact any data. views/synony
ms
Checks Batch Check Printing Access to all Restrict access to bank Access
accounts by Revenue through a
Entity. Corporate finance secured
users can read/transact Oracle ID
any data. using
views/synony
ms
Invoice Selection Paygroups & Restrict access by Access
Priorities Revenue Entity - through a
probably procedural secured
Corporate finance users Oracle ID
can read/transact any using
data. views/synony
ms
Assets Assets Run Depreciation Access to Restrict running by Legal Access
Form Entity for Legal Entity. through a
Corporate finance users secured
can read/transact any Oracle ID
data. using
views/synony
ms
Receivables Invoices AutoInvoice Access to all Restrict generation of Access
invoices by Revenue through a
Entity. Corporate secured
finance users can Oracle ID
Trusted Services
·
·
·
·
·
·
·
·
·
·
·
·
·
Open Issues
Closed Issues